From Barron's
0 visitor like this article | Viewed 4282 times | 0 comment
Summary: As we draw closer to the effective date of the Labor Department’s fiduciary rule in April, I’m astonished at how the nitty-gritty aspects of complying with the rule—such as how to define a client’s best interest, and which actions are considered conflicts of interest—are distracting from the bigger picture.
From OnWallStreet
0 visitor like this article | Viewed 4174 times | 0 comment
Summary: [INFOGRAPHIC] An increasing number of advisors are choosing the freedom and control that come with being an independent Registered Investment Advisor (RIA). What’s more, the RIA model is creating significant opportunity: RIA channel assets and revenue continue to climb—and it’s not just because of market returns. Take a closer look at the numbers.
From Financial Planning
0 visitor like this article | Viewed 4192 times | 0 comment
Summary: Many advisers have plans for growth, but does anyone really know what causes above-average sustained progress? Some might think exemplary esprit de corps among your employees will do it. Others may feel the best way to tap into a fantastic pool of potential clients is to locate an office where everyone has above-average incomes.
From InvestmentNews
0 visitor like this article | Viewed 4331 times | 0 comment
Summary: Imagine this. A (prospective) client has a significant investment in a particular asset. You receive notice that the costs being charged inside this product are being increased. In addition, this notice includes forward guidance downgrading future interest earnings expectations by 50 basis points and cautioning that interest earnings expectations could be further reduced by as much as another 100 basis points.
From Financial Plannning
0 visitor like this article | Viewed 4422 times | 0 comment
Summary: In the event of a hack, advisers need to know what to do right away— in the first five minutes, the first hour, the first day. We talked to planners and industry experts about the steps planners should take if they discover they've been hacked, as well as best practices for preventing future hacks from occurring.